Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp912984ybl; Fri, 24 Jan 2020 11:51:36 -0800 (PST) X-Google-Smtp-Source: APXvYqwxWTKU91vOVt+t5GBL7s08GC8zCon7OwP7C0xJeG9FUjYsf9w0U6DnWiRcPi+E8zNlcphO X-Received: by 2002:a9d:2264:: with SMTP id o91mr3914348ota.328.1579895496558; Fri, 24 Jan 2020 11:51:36 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579895496; cv=none; d=google.com; s=arc-20160816; b=xkR5CTd0qArDeaN86j4aIaK8t2tgus1S/G9ZMUYQd9R9ejSNYwqUqmoIlKGT/BPnrG D6OL0t3hwiItrLFaD5COjvV1bFT3bN5gGqolDtU2QF7gGVzIByDS+uklh+NoUCTWXmlQ kABVVQhAuBSUM3y6ohEOd+AtgCRotjmFqBFX05Ph8FRFB0KgRlbbdl0Si91l5H2E532i j7eo7RK+cD59ls3Db61EDGsc+Gx6QiTDJt3REXwnR+ZlPo+Gfb56F2TW8oVWqCxifpyM ew8CbieHvi3e4a5Hq0QjHd0P6/y73AamGS7e+GxNNzgpjWBrYnij1sTKJqzdV52DH38Q ckJA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=90LNDVSP0DBA9ydz75Y6AE8HXgWwSXxcYddiUBk/M/Y=; b=dWGckqSwt4geiHmPcpuo/odASPu03sZFE9tUqzY155Vk2DPAPC+NltUkMs00l6n9GQ So6+B7Mi7v6ICn8bOXjtlI+HbN7hoEwmiwTo6QkKfHG1Rf6sHDXX+f0+R8H6GuMxWMiV IEXAQdk7+2t00FaSZtc3llm+yTBMR7NIi94b1c2Vl0H/N3ptrjuDSGxZHTWayOHW1c+0 n64f77gXgagDU8Flx2055zWezcnbxPpTSkwH/i+8GmcSQU6/iBautHQAWosRzbiFtQLO I8i4sXUNH27Dm+ZApwjty2Yq9h2huk2ZVkPApAqArcdFaKEr3n3gbtuLxmpAoy8frPaI f2yA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=SFKKOEoU; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u5si1949295otg.66.2020.01.24.11.51.23; Fri, 24 Jan 2020 11:51:36 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=SFKKOEoU; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2391917AbgAXLfa (ORCPT + 99 others); Fri, 24 Jan 2020 06:35:30 -0500 Received: from mail.kernel.org ([198.145.29.99]:55440 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388424AbgAXLf1 (ORCPT ); Fri, 24 Jan 2020 06:35:27 -0500 Received: from localhost (ip-213-127-102-57.ip.prioritytelecom.net [213.127.102.57]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 7782324125; Fri, 24 Jan 2020 11:35:25 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1579865726; bh=8c+2tFdN24FrAVsa6vdFiza2LyH0hnYaDNcV2+0fWmA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=SFKKOEoU9paxW78iI2mo8peFWXxnTMEffM/g3UnBolUJbcIK/UayUG0FdJbuf4auh ryj8y7aJvyWOdyxshvw2WJ4CZnB4ZHkuTxjNFP0ltjirde+EQ0/neLHffsNrtceTLN EnvJuDCn2rF06+rhUL9rln1F0huOS06c8zoyZV3k= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Madalin Bucur , "David S. Miller" , Sasha Levin Subject: [PATCH 4.19 621/639] dpaa_eth: avoid timestamp read on error paths Date: Fri, 24 Jan 2020 10:33:11 +0100 Message-Id: <20200124093207.423730378@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200124093047.008739095@linuxfoundation.org> References: <20200124093047.008739095@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Madalin Bucur [ Upstream commit 9a4f4f3a894ff4487f5597b7aabba9432b238292 ] The dpaa_cleanup_tx_fd() function is called by the frame transmit confirmation callback but also on several error paths. This function is reading the transmit timestamp value. Avoid reading an invalid timestamp value on the error paths. Fixes: 4664856e9ca2 ("dpaa_eth: add support for hardware timestamping") Signed-off-by: Madalin Bucur Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/net/ethernet/freescale/dpaa/dpaa_eth.c | 17 ++++++++++------- 1 file changed, 10 insertions(+), 7 deletions(-) diff --git a/drivers/net/ethernet/freescale/dpaa/dpaa_eth.c b/drivers/net/ethernet/freescale/dpaa/dpaa_eth.c index 3cd62a71ddea8..d7736c9c6339a 100644 --- a/drivers/net/ethernet/freescale/dpaa/dpaa_eth.c +++ b/drivers/net/ethernet/freescale/dpaa/dpaa_eth.c @@ -1600,13 +1600,15 @@ static int dpaa_eth_refill_bpools(struct dpaa_priv *priv) * Skb freeing is not handled here. * * This function may be called on error paths in the Tx function, so guard - * against cases when not all fd relevant fields were filled in. + * against cases when not all fd relevant fields were filled in. To avoid + * reading the invalid transmission timestamp for the error paths set ts to + * false. * * Return the skb backpointer, since for S/G frames the buffer containing it * gets freed here. */ static struct sk_buff *dpaa_cleanup_tx_fd(const struct dpaa_priv *priv, - const struct qm_fd *fd) + const struct qm_fd *fd, bool ts) { const enum dma_data_direction dma_dir = DMA_TO_DEVICE; struct device *dev = priv->net_dev->dev.parent; @@ -1648,7 +1650,8 @@ static struct sk_buff *dpaa_cleanup_tx_fd(const struct dpaa_priv *priv, } /* DMA unmapping is required before accessing the HW provided info */ - if (priv->tx_tstamp && skb_shinfo(skb)->tx_flags & SKBTX_HW_TSTAMP) { + if (ts && priv->tx_tstamp && + skb_shinfo(skb)->tx_flags & SKBTX_HW_TSTAMP) { memset(&shhwtstamps, 0, sizeof(shhwtstamps)); if (!fman_port_get_tstamp(priv->mac_dev->port[TX], (void *)skbh, @@ -2118,7 +2121,7 @@ dpaa_start_xmit(struct sk_buff *skb, struct net_device *net_dev) if (likely(dpaa_xmit(priv, percpu_stats, queue_mapping, &fd) == 0)) return NETDEV_TX_OK; - dpaa_cleanup_tx_fd(priv, &fd); + dpaa_cleanup_tx_fd(priv, &fd, false); skb_to_fd_failed: enomem: percpu_stats->tx_errors++; @@ -2164,7 +2167,7 @@ static void dpaa_tx_error(struct net_device *net_dev, percpu_priv->stats.tx_errors++; - skb = dpaa_cleanup_tx_fd(priv, fd); + skb = dpaa_cleanup_tx_fd(priv, fd, false); dev_kfree_skb(skb); } @@ -2205,7 +2208,7 @@ static void dpaa_tx_conf(struct net_device *net_dev, percpu_priv->tx_confirm++; - skb = dpaa_cleanup_tx_fd(priv, fd); + skb = dpaa_cleanup_tx_fd(priv, fd, true); consume_skb(skb); } @@ -2435,7 +2438,7 @@ static void egress_ern(struct qman_portal *portal, percpu_priv->stats.tx_fifo_errors++; count_ern(percpu_priv, msg); - skb = dpaa_cleanup_tx_fd(priv, fd); + skb = dpaa_cleanup_tx_fd(priv, fd, false); dev_kfree_skb_any(skb); } -- 2.20.1